Skip to main content

2015 | OriginalPaper | Buchkapitel

Using Signature for Hidden Communication Prevention in IP Telephony

verfasst von : Ajvad Rahman, P. P. Amritha

Erschienen in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011) W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011)
2.
Zurück zum Zitat A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004) A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004)
3.
Zurück zum Zitat K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002) K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002)
4.
Zurück zum Zitat J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618 J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618
5.
Zurück zum Zitat C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006) C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006)
6.
Zurück zum Zitat C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262 C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262
7.
Zurück zum Zitat T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007) T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007)
8.
Zurück zum Zitat N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611 N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611
9.
Zurück zum Zitat K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer Science—Research and Applications (IBIZA 2006) (2006) K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer ScienceResearch and Applications (IBIZA 2006) (2006)
10.
Zurück zum Zitat K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018 K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018
11.
Zurück zum Zitat L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008) L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)
12.
Zurück zum Zitat A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010) A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010)
Metadaten
Titel
Using Signature for Hidden Communication Prevention in IP Telephony
verfasst von
Ajvad Rahman
P. P. Amritha
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_52

Premium Partner